EID 100 Lecture Notes - Lecture 4: Xcode, Big Data, Mark Zuckerberg

111 views7 pages

Document Summary

Note: next week, class will be in the launch zone! Thieves are constrained by the physical aka location (a thief needs to be physically at your house to break into it) No more physical constraints - physically strong. Governments want to make them legally weak by creating a backdoor - a key that allows them to access the information as they need or want. They want to ensure that they can get into any lock. When hackers hack into computers, they aren"t deciding exactly what computers to hack. Instead, they"re using software to brute force thousands of password combinations into thousands of computers at once. Safebox, insurance, cameras, monitor it, bury it. You wouldn"t just use one method or one layer of security. Similarly, you wouldn"t just use one layer of security for your digital goods. If you find out about the person, it makes it very easy -> social engineering.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers